Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 06:04

General

  • Target

    c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe

  • Size

    175KB

  • MD5

    c03f4e5a9e4c36c1a0d3c8a484b7fff0

  • SHA1

    b870b638b87f1fd0ee962250aee8ea836108bcca

  • SHA256

    fd99c3ebdc8a6c7f1f569454f32e61ba8893a28b2f9ea1936ced58d5f4e17c1c

  • SHA512

    511cba299d56e9613cbe61affaae932f9d00842ca90fc5ae7ee853f9a88c44d5638c88bf1c938bdf04b48523b0d6954a30be7df6a82885b44bf2d4989cada728

  • SSDEEP

    3072:KM9qOXo7oFDpDvypHj1B/N5ADbZKWswlp2EUP5:KM9qiO/NUdswlEEUB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:1860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe

    Filesize

    175KB

    MD5

    701db1a6b5e17ec0f9a94783ba223f83

    SHA1

    08a8af4c108aea704d16cd4c3be4d978e61b8787

    SHA256

    0f560f3867887417f1c3cc71fe8c621f2bf07c6b7a0a9dc9d78bfbad4e68b0c6

    SHA512

    715592607672bcdc2d544412921d5ec2cae13cf67018191b1bf5cfd934090dca7b6f2737aec68a441cfb65ad7ba687ca0902ba98413fe634385fa650b2bc2130

  • memory/1860-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1860-17-0x0000000000340000-0x0000000000373000-memory.dmp

    Filesize

    204KB

  • memory/2256-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2256-6-0x0000000000210000-0x0000000000243000-memory.dmp

    Filesize

    204KB

  • memory/2256-11-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB